Chinese hackers are attacking IoT devices

Telnet brute force Chinese attacks targeting IoT devices have risen by 249% since 2016.
Latest Threat Intelligence report revealed that businesses’ vulnerable IoT devices
can be attacked with new brute force hacks that are becoming more and more common and harder to monitor.
Research reveals that 44% of attack traffic originates from China and IP addresses in Chinese networks. The most affected nations are the U.S., Singapore, Spain, and Hungary.

The only good news is that in the last half of 2017, researchers recorded a decrease in attack volume compared to the first half of the year: a 77% decline. Still, the attack levels are higher than during the height of Mirai- the notorious botnet that infected hundreds of thousands of IoT devices, such as CCTV, routers, and DVRs.
In order to stay away from any threats like this, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running.
If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;

These new cyber attacks are orchestrated by cybercriminals that are changing tactics with increasing speed and diversity. Nowadays hackers are using multiple new methods to infect IoT devices for at least a year. They are also targeting fewer devices, choosing to infect non-standard ports and protocols, specific manufacturers, device types, and models. Cryptocurrency mining is a good example of an IoT attack that would likely go undetected if it didn’t cause a noticeable impact, such as slow device performance.
IoT devices highest adoption level is yet to be reached if development cybersecurity standards will remain unchanged, businesses across the globe will continue bringing or using insecure IoT devices. Every business environment must expand its cybersecurity sector and related services to a wider range of enterprise applications.
App owners or developers must be encouraged to better collaborate with top cybersecurity firms in order to significantly improve the performance, availability, and security of all applications
Users and businesses must protect themselves, here are some simple steps to do this:

• Always have redundancy for critical services in case of a cyber attack
• Implement a multi-factor authentication system
• Use decryption inside the network to intercept and catch malicious traffic hiding in encrypted traffic
• Conduct regular IoT device security audits, test IoT products before use, and ensure robust employee education programmes are in place

We would continue to monitor this cyberthreat. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.